Exam 3 Flashcards
Address Spoofing
changes an originating address or a destination address to redirect the flow of data between two parties
AES
(Advanced Encryption Standard) is the encryption standard currently used worldwide
Antivirus Program
type of utility software that looks for and eliminates viruses, trojans, worms, and other malware
Botnet
a client-server network created by hackers who gain control over several computers; this network is hidden from the victims, who continue to use their devices
Case Tool
(computer-aided software engineering tool) is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs
Common Carrier*
entity who provides wired/wireless communication services to general public for a fee
Computer Generations*
1G – Vacuum Tubes
2G - transistors and OS
3G – integrated circuits
4G – general purpose micro processors
Computer Virus*
is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. NOT SELF DISTRIBUTING*
Computer Worm*
3 types
Mass mailing – sends itself out in emails
Internet – Embeds itself in web pages
File sharing – embeds itself in files and internet networks.
CRT*
Cathode Ray Tube, technology that was handily there from television tech for computers.
Cyberwarfare
is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent’s information systems and defensive capabilities
Data Breach
is an incident in which personal data is viewed, accessed, or retrieved without authorization
Data Center
is a specialized facility designed to hold and protect computer systems and data
Disaster Recovery Plan
is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs
Disruptive Technology*
displaces an existing business process, market, industry, or product ---- Examples: Cellphones, computers --- Usually positive, can be negative.
Electronic Communications Privacy Act*
(ECPA) prohibits unauthorized interception or disclosure of wire and electronic communications or unauthorized access to stored communications
Encryption (m)
transforms a message or data file in such a way that its contents are hidden from unauthorized readers
Expert Systems
Fuzzy logic
Feature Creep
one of the steps of failure, when you add too many features and it causes you go to over budget or miss deadlines
Firewall
- is a device or software that is designed to block unauthorized access while allowing authorized communications